scot berner

@slobtresix0

Christian, Husband, Father, InfoSec Guy, Wakeboarder, Marksmen. - open to mentor, answer questions or review CFPs -

127.0.0.1
Vrijeme pridruživanja: veljača 2011.

Tweetovi

Blokirali ste korisnika/cu @slobtresix0

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @slobtresix0

  1. Prikvačeni tweet
    27. velj 2017.

    Think how insecure the average company is, then realize half of them are less secure than that...

    Poništi
  2. proslijedio/la je Tweet

    Come see the team at Blackhat this year with an incredible course focusing on Purple Teaming ! I’ll be there with everyone and really a great way to learn offense and defense.

    Poništi
  3. 27. sij

    Woot exited to talk with the awesome !!!

    Poništi
  4. proslijedio/la je Tweet
    24. sij

    Round 2 of our call for paper voting is wrapping up, we'll have the new talks posted soon!! Until then check out our talks from Round 1 selections:

    Poništi
  5. proslijedio/la je Tweet
    23. sij

    Don’t get lost in an unknown network! is breaking down the problem with Enumeration of Active Domain (AD) in his latest From tester to defender, this is important for all professionals

    Poništi
  6. 20. sij

    Super leet threat intel of the day…. Go logon to GitHub… and search your company name + LDAP, you are welcome :)

    Poništi
  7. proslijedio/la je Tweet
    19. sij

    98% of the attackers that we can catch are the ones who just reuse random tools... For everyone else our advisories just say we found one instance of this amazing custom toolkit and we're not sure where else it was deployed.... ;)

    Poništi
  8. 16. sij
    Poništi
  9. 9. sij

    Remote iPhone Exploitation Part 1: Poking Memory via iMessage and CVE-2019-8641 Good read

    Poništi
  10. 6. sij

    This is a good lecture if you are giving a talk:

    Poništi
  11. 30. pro 2019.
    Poništi
  12. 21. pro 2019.

    Idk why I didn’t do this earlier... but these are awesome for home pfsense/bro etc, and they make great pentest dropboxes with a little finesse

    Poništi
  13. 18. pro 2019.

    kinda just marveling that... the most novel ttps.. are probably at the library and not the internet...

    Poništi
  14. 11. pro 2019.
    Poništi
  15. proslijedio/la je Tweet
    3. pro 2019.

    Some of the best security controls in the world are right at the defense’s fingertips, and always have been.

    Poništi
  16. 26. stu 2019.

    Red teams main value is the validation or challenging of defenders assumptions. Sometimes, defenders get to challenge the assumptions of offensive operators too :)

    Poništi
  17. proslijedio/la je Tweet
    7. stu 2019.

    Senior Research Analyst Christopher Paschen is reviewing two Microsoft languages that can be used for initial code execution on a new target in his blog “Finding and Identifying Jscript / VBScript Callable COM Objects.”

    Poništi
  18. 4. stu 2019.

    MyAnalytics is a great source of situational awareness for compromised users activity. Very useful to internal - internal SE.

    Poništi
  19. 29. lis 2019.
    Poništi
  20. 24. lis 2019.

    That feel when fixes your python… lol

    Poništi
  21. 23. lis 2019.

    Range of Mousejack Attack More Than Doubles | Threatpost. * anyone know which antennas where used in this article or had any luck extending the range *

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·